Skip to main content

CVE-2025-26863: Denial of Service in Intel(R) 700 Series Ethernet

Medium
VulnerabilityCVE-2025-26863cvecve-2025-26863
Published: Tue Aug 12 2025 (08/12/2025, 16:59:25 UTC)
Source: CVE Database V5
Product: Intel(R) 700 Series Ethernet

Description

Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.

AI-Powered Analysis

AILast updated: 08/20/2025, 01:45:40 UTC

Technical Analysis

CVE-2025-26863 is a vulnerability identified in the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, affecting versions prior to 2.28.5. The issue arises from uncontrolled resource consumption within the driver, which can be triggered by an authenticated user with limited privileges. This resource exhaustion can lead to a denial of service (DoS) condition, potentially disrupting network connectivity or degrading system performance. The vulnerability does not require user interaction and does not affect confidentiality or integrity directly but impacts availability. The CVSS 4.0 score of 4.8 (medium severity) reflects the limited attack vector (local access required) and the need for low privileges but no user interaction. The flaw is specific to the Intel 700 Series Ethernet hardware and its Linux driver implementation, indicating that systems running Linux with these network adapters and outdated drivers are susceptible. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may require updating to version 2.28.5 or later once available.

Potential Impact

For European organizations, this vulnerability could disrupt critical network infrastructure, especially in environments relying on Intel 700 Series Ethernet adapters within Linux-based servers or network appliances. The denial of service could lead to temporary loss of network connectivity or degraded performance, impacting business operations, data center availability, and cloud services. Organizations in sectors such as finance, telecommunications, healthcare, and government, which often use Linux servers with high-performance network cards, may experience operational interruptions. Although exploitation requires authenticated access, insider threats or compromised user accounts could leverage this vulnerability to cause service outages. The medium severity suggests a moderate risk, but in high-availability environments, even temporary DoS can have significant operational and reputational consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify all systems using Intel 700 Series Ethernet adapters running Linux and verify the driver version. 2) Apply the updated driver version 2.28.5 or later as soon as it becomes available from Intel or Linux distribution vendors. 3) Restrict local user privileges to minimize the number of users who can trigger the vulnerability, enforcing strict access controls and least privilege principles. 4) Monitor network interface performance and system logs for unusual resource consumption patterns that may indicate exploitation attempts. 5) Employ network segmentation to isolate critical systems and limit the impact of potential DoS attacks. 6) Incorporate this vulnerability into vulnerability management and patching cycles to ensure timely updates. 7) Educate system administrators about the risk and signs of exploitation to enable rapid response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-02-21T04:00:25.898Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad0034936e

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 8/20/2025, 1:45:40 AM

Last updated: 9/1/2025, 11:42:07 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats